Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 22:50

General

  • Target

    17d2a67a718e6fa775f27cf17be51b2e_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    17d2a67a718e6fa775f27cf17be51b2e

  • SHA1

    ce9a63cbfa82d2cb04a1f684a473d8d83ab5b8e1

  • SHA256

    7b048c70b522428453b8266cf9891d0196fc845d3c016abc2de2c97bcdbe33df

  • SHA512

    6c3e8601841a99b3f4f222909d0f83bf8c2339997776c87ced1a27dcfee71627a1b2f1ef93401585ecea183f691f766d2e81226e29bb0bd632ed3563512424a3

  • SSDEEP

    384:qjqYAq6Xbp/axFPAiMQDN8OZcSszKA0H9cBgYtigAeM8:4qD2PAbyOOOLzKtHQxtigzN

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d2a67a718e6fa775f27cf17be51b2e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17d2a67a718e6fa775f27cf17be51b2e_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\CAC2.tmp.bat
      2⤵
        PID:3200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CAC2.tmp.bat

      Filesize

      207B

      MD5

      5ff013867566fd9d165ee29e9c763ac9

      SHA1

      49acea3d41afa13274b52fcfb0fedd0343d9a376

      SHA256

      0c3c2c82f7f4d417a1f838cffa4b9c96c894fafb82750afa86c43017b99fbf27

      SHA512

      041f5a324fe945f51077c1b184bb2cd1502edb806110959843abac50da7658e3bf5ec8eabfdab086cd405f514c931f706defcdbfe946d3a44f92ca999619b8c5

    • C:\Users\Admin\AppData\Local\Temp\pcgcynea.tmp

      Filesize

      2.4MB

      MD5

      60be30d67142a922e67e2ee7f4e02bc9

      SHA1

      3a53212d228e8c093ce64e3def9fa2ad7d6fd05d

      SHA256

      a23ea6461c312bd3c8c0a259fafdc34c85c1bb40badef7d428ed1f05f26cc682

      SHA512

      8de9cdef73c985879c23c6c1bcd8493b971ae606e16926ce498551413db8a23b3247d980d8a8d7fa44d13b524601456accfff057e33ff7d4da6bcf052436bb93

    • memory/5112-13-0x0000000010000000-0x000000001006C000-memory.dmp

      Filesize

      432KB

    • memory/5112-17-0x0000000010000000-0x000000001006C000-memory.dmp

      Filesize

      432KB